Deleted tweet detection is currently running at reduced capacity due to changes to the Twitter API. Some tweets that have been deleted by the tweet author may not be labeled as deleted in the PolitiTweet interface.

Showing page 63 of 151.

Profile Image

Joanna Rutkowska @rootkovska

RT @isislovecruft: If you leak private info (urls, typing cadence) to the network, it doesn't matter how good the crypto is—your app isn't… — PolitiTweet.org

Posted June 15, 2017 Retweet
Profile Image

Joanna Rutkowska @rootkovska

RT @mulander: For those that were asking - @whispersystems #signal doesn't leak data by fetching previous. I checked (on Android). https://… — PolitiTweet.org

Posted June 15, 2017 Retweet
Profile Image

Joanna Rutkowska @rootkovska

RT @mulander: Very creepy @WhatsApp, someone was apparently typing in an URL and WhatsApp was fetching it off my server char-by-char https:… — PolitiTweet.org

Posted June 15, 2017 Retweet
Profile Image

Joanna Rutkowska @rootkovska

RT @epakskape: @kautuhala We primarily view KASLR as a mitigation against remote exploits — PolitiTweet.org

Posted June 15, 2017 Retweet
Profile Image

Joanna Rutkowska @rootkovska

RT @AdamOfDc949: @rootkovska In case you didn't already see these: https://t.co/VnCShDUpgj https://t.co/rTdaJOaMtI I have a feeling you mi… — PolitiTweet.org

Posted June 14, 2017 Retweet
Profile Image

Joanna Rutkowska @rootkovska

Also reminded me the work on IOMMU attacks, which Rafał & I did in 2011. AFAIK still the only software IOMMU bypass? https://t.co/dIds0KXATO — PolitiTweet.org

Posted June 14, 2017
Profile Image

Joanna Rutkowska @rootkovska

PCIe and IOMMU fuzzing by Google engineers. Interesting. Also can't wait until they start fuzzing CPU instructions… https://t.co/XxMaTMd8AB — PolitiTweet.org

Julia Hansbrough @flowerhack

My day job involves breaking hardware and it's pretty fun: https://t.co/ER8zP1M78E

Posted June 14, 2017
Profile Image

Joanna Rutkowska @rootkovska

RT @Tails_live: Tails 3.0 is out: https://t.co/cMOzflkO1H based on @Debian 9, brand new startup and shutdown, security improvements in dept… — PolitiTweet.org

Posted June 13, 2017 Retweet
Profile Image

Joanna Rutkowska @rootkovska

@qwazix cost — PolitiTweet.org

Posted June 13, 2017
Profile Image

Joanna Rutkowska @rootkovska

@qwazix 2. I'm far from suggesting that locking down users (DRM-style) is the solution. Check e.g.: https://t.co/FObjX3KhAf — PolitiTweet.org

Posted June 13, 2017
Profile Image

Joanna Rutkowska @rootkovska

@qwazix 1. Not every adversary wants to kill the victim. There are many scenarios where they'd prefer subtle means… https://t.co/FhTiOeQr6F — PolitiTweet.org

Posted June 13, 2017
Profile Image

Joanna Rutkowska @rootkovska

There is no spoon. https://t.co/G1PYrnF7qO — PolitiTweet.org

Katherine Scott @kscottz

I had to double check this using the Gimp. It is not a fake. Seeing is not believing. https://t.co/q8zHa4HIPH

Posted June 12, 2017
Profile Image

Joanna Rutkowska @rootkovska

@c_pellegrino Yes. Or something like that. — PolitiTweet.org

Posted June 12, 2017
Profile Image

Joanna Rutkowska @rootkovska

@daveaitel @dwizzzleMSFT Exactly what I wanted to ask also... What's your threat model, guys? — PolitiTweet.org

Posted June 12, 2017
Profile Image

Joanna Rutkowska @rootkovska

@AliMirjamali Yes, for many reasons, and we're working on this. But for Qubes 4.1. — PolitiTweet.org

Posted June 12, 2017
Profile Image

Joanna Rutkowska @rootkovska

But attackers might exploit DP to force GPU to DMA? And proper way to cut this is via GUIdom, not by disabling DMA on lock screen, IMHO. — PolitiTweet.org

Posted June 12, 2017
Profile Image

Joanna Rutkowska @rootkovska

Normally this is not a problem, since GPU often part of the CPU package, so need to be trusted anyway. However... — PolitiTweet.org

Posted June 12, 2017
Profile Image

Joanna Rutkowska @rootkovska

But to be fair: only Qubes 4.1 (i.e. when we introduce full GUI domain) will be protected against DMA from malicious GPU devices. — PolitiTweet.org

Posted June 12, 2017
Profile Image

Joanna Rutkowska @rootkovska

Only a few more and it'll be just like on Qubes ;) - USBGuard - NetStackGuard - GUIGuard (aka win32k) - ClipboardGu… https://t.co/1PVKIwvyTX — PolitiTweet.org

Alex Ionescu @aionescu

Windows RS3 19093+ Introduce "DMA Guard" which uses GUID_CONSOLE_LOCKED and Session Notifications to disable DMA at the lock screen.

Posted June 12, 2017
Profile Image

Joanna Rutkowska @rootkovska

RT @aionescu: Windows RS3 19093+ Introduce "DMA Guard" which uses GUID_CONSOLE_LOCKED and Session Notifications to disable DMA at the lock… — PolitiTweet.org

Posted June 12, 2017 Retweet
Profile Image

Joanna Rutkowska @rootkovska

Very true & very disappointing. Also contrasts with how we - humans - tend to boast our intellectual superiority o… https://t.co/zKhDT9mK68 — PolitiTweet.org

Dino A. Dai Zovi @dinodaizovi

Anything that requires many people to have advanced knowledge doesn't scale. The reason software exists is to encapsulate domain knowledge.

Posted June 12, 2017
Profile Image

Joanna Rutkowska @rootkovska

Complete misunderstanding example (of both my intention, and threat model): https://t.co/wN1jO6OnDV — PolitiTweet.org

qwazix @qwazix

Another excuse to lock users out of their computers. As if #BadValet couldn't just install a bomb under the hood a… https://t.co/P5bHTSNhEy

Posted June 12, 2017
Profile Image

Joanna Rutkowska @rootkovska

But at least let's hope it's _well_ compartmentalized, so no _trivial_ access to mics, gps, etc, right? (Not to mention core car systems..) — PolitiTweet.org

Posted June 11, 2017
Profile Image

Joanna Rutkowska @rootkovska

When was the last time you left your car at a car wash? #BadValet is the new #EvilMaid, who would have thought... https://t.co/yyDxTFKvva — PolitiTweet.org

Jay Turla @shipcod3

Just a simple PoC that the USB port is an attack surface for a Mazda's infotainment system https://t.co/pmaD14V0r7 https://t.co/zMhbDCblfh

Posted June 11, 2017
Profile Image

Joanna Rutkowska @rootkovska

RT @thegrugq: Real talk on Reality — some thoughts on Reality Winner. https://t.co/3sFPjprnoU — PolitiTweet.org

Posted June 10, 2017 Retweet
Profile Image

Joanna Rutkowska @rootkovska

RT @lyon01_david: 300 pages of spec for ADS-B (aviation) and no mention of security :D https://t.co/TtX5jP0Uf6 — PolitiTweet.org

Posted June 10, 2017 Retweet
Profile Image

Joanna Rutkowska @rootkovska

RT @XenoKovah: Remember that time we showed using AMT SOL for C2 from SMM...? https://t.co/cP8tYtT5hE section 6.2 https://t.co/Fdtrwq59fP — PolitiTweet.org

Posted June 9, 2017 Retweet
Profile Image

Joanna Rutkowska @rootkovska

Just another covert channel (cooperation on both ends required), only with the help of AMT.. But also: unexpected a… https://t.co/qJ77M4jY8j — PolitiTweet.org

Windows Defender Security Intelligence @WDSecurity

PLATINUM attackers can use Intel AMT SOL for stealthy C2 even with network cards disabled. Analysis and demo at… https://t.co/Ur2CvNN46a

Posted June 9, 2017
Profile Image

Joanna Rutkowska @rootkovska

That sounds like a cool watermarking indeed! Can imagine easily doable for source code also and not to mention bina… https://t.co/egDOhJf2FX — PolitiTweet.org

Emily Pixels @PixlEmly

@rootkovska most interesting one switched out words for synonyms keyed off the viewing userid

Posted June 7, 2017
Profile Image

Joanna Rutkowska @rootkovska

1. Can easily imagine watermarking which survives color->B&W conversion, 2. Feeding untrusted PDFs to ImageMagick is... controversial. — PolitiTweet.org

Posted June 7, 2017